1. M. Ahemd, M. Shah and A. Wahid, The Middle East under Malware Attack Dissecting Cyber Weapons, Proceedings of the International Conference on Communication Technologies, pp. 104–110, 2017.
2. C. Alcaraz, G. Fernandez and F. Carvajal (Eds.), Security Aspects of SCADA and DCS Environments, Springer Berlin Heidelberg, 2012.
3. ATENA Consortium, ATENA: Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures, Horizon 2020 Secure Societies - DS-3-2015 G.A. 700581, (https://www.atena-h2020.eu), 2016.
4. P. Capodieci, S. Diblasi, E. Ciancamerla, M. Minichino, C. Foglietta, D. Lefevre, G. Oliva, S. Panzieri, R. Setola, S. De Porcellinis, F. Delli Priscoli, M. Castrucci, V. Suraci, L. Lev, Y. Shneck, D. Khadraoui, J. Aubert, S. Iassinovski, J. Jiang, P. Simoes, F. Caldeira, A. Spronska, C. Harpes and M. Aubigny, Improving resilience of interdependent critical infrastructures via an on-line alerting system, Proceedings of the Conference Complexity in Engineering, pp. 88–90, 2010.
5. CERT-MU, The WannaCry Ransomware, (http://cert-mu.govmu.org/English/Documents/White%20Papers/White%20Paper%20-%20The%20WannaCry%20Ransomware%20Attack.pdf), 2017.